CWE-112: Missing XML Validation

Base Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product accepts XML from an untrusted source but does not validate the XML against the proper schema.

扩展描述

Most successful attacks begin with a violation of the programmer's assumptions. By accepting an XML document without validating it against a DTD or XML schema, the programmer leaves a door open for attackers to provide unexpected, unreasonable, or malicious input.

常见后果

影响范围: Integrity

技术影响: Unexpected State

潜在缓解措施

阶段: Architecture and Design

策略: Input Validation

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

引入模式

阶段 说明
Implementation -

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
7 Pernicious Kingdoms - Missing XML Validation -
Software Fault Patterns SFP24 Tainted input to command -
关键信息

CWE ID: CWE-112

抽象级别: Base

结构: Simple

状态: Draft

相关弱点
相关攻击模式
CAPEC-230 CAPEC-231